relyea%netscape.com
8e47db3b48
bug 161552: Make the recipient list traversal functions call the internal
...
nsstoken_FindCertByIssuerAndSN() function to gain the benefit of the fixed
Searching code.
2002-08-14 20:42:40 +00:00
jpierre%netscape.com
cd77147500
Stop referencing deleted quickder.h header
2002-08-08 01:55:34 +00:00
jpierre%netscape.com
38fe6c93a3
Implement partial CRL decoding. Fix for 149816. r=wtc . Uses new quick DER decoder
2002-08-07 03:44:12 +00:00
relyea%netscape.com
0cd1ab2a75
1) factor out fortezzav1 from the chain processing code to make the code easier
...
to read.
2) only extract keys if we are using fortezzav1 cert (should speed up cert verify
a bit).
3) Add function to verify a specific CA cert to verify a userCert Usage.
2002-08-02 17:51:20 +00:00
jpierre%netscape.com
a90ba74ddc
Fix compiler warnings on NT
2002-08-02 00:53:15 +00:00
jpierre%netscape.com
d5f399f630
Fix incorrect macro usage
2002-08-02 00:28:23 +00:00
nelsonb%netscape.com
ce72d3cec3
Correct the test of IP addresses in Subject Alternative Name extensions.
...
bug 103752.
2002-08-01 22:51:56 +00:00
nelsonb%netscape.com
c5ab2eb27e
Fix code to work when subjectAltName extension not present in server cert.
...
Bug 103752.
2002-07-30 23:15:43 +00:00
nelsonb%netscape.com
44acb4b48b
Examine SubjectAltName extensions for SSL server name matching.
...
Bug 103752.
2002-07-30 19:32:33 +00:00
jpierre%netscape.com
6a2b391359
158005 - add new CRL decode and import functions . Benefits are :
...
- ability to import to any slot
- ability to specify decode options, such as "don't copy DER"
- ability to specify import options, such as "don't do CRL checks"
This patch also maps the existing functions SEC_NewCrl and CERT_ImportCRL
to this new function, eliminating the code duplication that existed
2002-07-19 00:59:34 +00:00
jpierre%netscape.com
b059277104
Fix for 156802 - remove improper check in CRL decoding
2002-07-19 00:12:13 +00:00
jpierre%netscape.com
15d93f6e71
Fix for 154212
2002-07-10 00:56:16 +00:00
jpierre%netscape.com
820318fca7
Fix for 154212 - update patch for CERT_SaveSMimeProfile based on Bob's comments
2002-07-10 00:07:39 +00:00
jpierre%netscape.com
725d6b457a
Add new CERT_VerifyCertificate function - fix for 149832
2002-07-04 03:09:49 +00:00
relyea%netscape.com
2691dfaecb
More performance improvements in listing certs:
...
1) reduce more short term memory allocate/frees.
2) remove sha1 hash calculations from critical paths.
3) when listing user certs, skip decoding of non-user certs.
2002-07-02 15:11:29 +00:00
jpierre%netscape.com
34637a1925
Fix for 154212 - make CERT_SaveSMimeProfile copy the cert to the database if it comes from an external source
2002-06-27 00:18:35 +00:00
relyea%netscape.com
07e1a10985
Reduce the cost of decoding a certificate.
2002-06-20 18:53:16 +00:00
rangansen%netscape.com
987e670221
exporting CERT_VerifyCertChain. r=relyea
2002-06-19 15:58:51 +00:00
relyea%netscape.com
5af6761fdf
Add series to keep track of object handle value validity.
2002-06-13 21:42:41 +00:00
relyea%netscape.com
78d49962a7
Don't crash if url is specified, but the crl is broken
2002-05-21 21:26:52 +00:00
ian.mcgreer%sun.com
15cbb51ea4
bug 144309, return value of STAN_GetCERTCertificate not checked
...
r=wtc
2002-05-20 18:05:11 +00:00
jpierre%netscape.com
9403262b78
Fix for bug 142868 - CA certificates are imported with NULL nicknames .
2002-05-10 20:21:38 +00:00
relyea%netscape.com
b815a638c1
Automatically create a NULL email profile for certs with email addresses which
...
are imported into the internal token.
2002-05-07 20:38:59 +00:00
ian.mcgreer%sun.com
74f7a8a572
bug 141355, CERT_DecodeDERCertificate is not a safe function for some uses, must be replaced with CERT_NewTempCertificate.
2002-05-02 19:00:13 +00:00
wtc%netscape.com
470f233add
Deleted code that was made obsolete by the previous revision.
2002-04-25 21:10:09 +00:00
ian.mcgreer%sun.com
980175a1c0
bug 138626, remove deleted cert from cache even if references still exist
2002-04-25 19:37:30 +00:00
relyea%netscape.com
5c82cde910
Don't crash if we don't find the profile (and thus don't have a slot to free).
2002-04-24 22:23:37 +00:00
ian.mcgreer%sun.com
ff149d2fc9
NewTemp has to be matched with AddTempCertToPerm
2002-04-22 20:27:52 +00:00
relyea%netscape.com
9c0eda08dc
Token and cert processing fixes:
...
1) use NewTempCert rather than DERDecode cert in all import cert cases.
When DERDecode cert is used, we may wind up with a cert that gets cleared
when we try to import it because it already in the cache. NewTempCert will
return the version that is in the cache.
2) If we are returning the CAList, only return certs that are CA's
(not usercerts).
3) Authenticate to all the tokens if necessary before we try to list
certs. (Stan code should eventually get automatic authentication calls in
the code itself).
4) When looking up user certs, don't return those certs with the same
subject, but do not have any key material associated with them (that is
don't crash if we have old certs in our database without nicknames, but
match user certs on our smart cards).
5) Save the nickname associated with our subject list in the temp
cache so we can correctly remove the entry even if the cert's nickname
changes (because of smart card insertions and removals, or because of
creation and deletions of our user cert).
2002-04-22 19:09:01 +00:00
ian.mcgreer%sun.com
a5c756c373
fix bugs in cert import with smart card cache
2002-04-22 14:14:44 +00:00
ian.mcgreer%sun.com
46d73e79e3
bug 135521, change cert lookups on tokens to be actual finds instead of traversals
2002-04-15 15:22:11 +00:00
relyea%netscape.com
14e7ed26f6
Bug 133584: Fix reference leaks which prevent shutdown in NSS and in the tests.
...
Debug builds can verify correct operation by setting NSS_STRICT_SHUTDOWN, which
will cause an assert if shutdown is called but not all the modules are freed (which
means a slot, key, or cert reference has been leaked).
2002-04-12 19:05:21 +00:00
nelsonb%netscape.com
8f5d6f3546
Add enum names for use in forward declarations.
2002-04-10 23:27:50 +00:00
ian.mcgreer%sun.com
9af2d39dfa
bug 135871, CERT_ImportCerts not storing temp certs
...
r=relyea
2002-04-09 23:46:57 +00:00
wtc%netscape.com
cfbef65b96
Bug 135728: should return SECFailure because the function's return type
...
is SECStatus. r=mcgreer.
2002-04-05 19:25:48 +00:00
wtc%netscape.com
d8a51378d3
Bugzilla bug 130703: final adjustment of the CERTSignedCrl structure for
...
NSS 3.4. r=relyea.
2002-03-15 20:21:45 +00:00
wtc%netscape.com
c3e27be65d
Bugzilla bug 130983: SEC_FindCrlByName needs to set the 'pkcs11ID' field
...
of the CERTSignedCrl structure it returns. The patch is contributed by
Rangan Sen <rangansen@netscape.com>. r=relyea.
2002-03-15 20:17:15 +00:00
ian.mcgreer%sun.com
16ce4e209f
bug 129709, incorrect free of cert->nickname
...
r=wtc
2002-03-14 17:42:02 +00:00
wtc%netscape.com
bd9858f008
Bugzilla bug 130703: fixed several issues in the NSS 3.4 exported headers.
...
1) Preseve the position of NSS 3.3 elements in the data structures. Some
new fields replace some old deprecated fields where possible to preserve
the total size of the structure.
2) Stan headers are removed from public exports.
3) Some exported functions didn't have prototypes in the public headers.
4) One bug fix: dev3hack.c did not pass the second argument to
nssToken_DestroyCertList.
5) Include the necessary headers to fix undeclared function warnings.
2002-03-14 04:12:25 +00:00
ian.mcgreer%sun.com
d08e06e182
bug 129298, handle different nicknames across tokens
...
r=relyea/a=wtc
2002-03-07 22:08:00 +00:00
ian.mcgreer%sun.com
87499c7372
bug 129370, temp cert trusts and S/MIME profiles may cause crashes
...
r/a=wtc
2002-03-07 20:42:40 +00:00
wtc%netscape.com
d0a5d7f2a8
Bugzilla bug 128915: the first part of the previous change is not
...
necessary, so replace it with an assertion. r=mcgreer.
2002-03-05 15:49:33 +00:00
ian.mcgreer%sun.com
e47f6581e4
bug 128915, prevent crash on empty S/MIME profiles
2002-03-04 23:19:20 +00:00
wtc%netscape.com
81cd8d66fb
Bugzilla bug 122261: removed an assertion on bad input. Bad input should
...
be reported by returning a failure status. Thanks to erl@voxi.com
(Erland Lewin) for the bug report. r=relyea,kaie.
2002-03-02 15:31:25 +00:00
ian.mcgreer%sun.com
68e04b2ebb
bug 125796, make sure all CERTCertificates are destroyed as such, and that cache collisions when traversing are handled correctly (by destroying extra reference)
2002-02-26 16:21:48 +00:00
relyea%netscape.com
7ccb67b360
CRL issues: 1) return url when finding and importing CRL's.
...
2) fix CERT_ImportCRL so it actually works.
NOTE: Calls of SEC_NewCrl() should verify the signature on the CRL before
importing!.
2002-02-26 02:02:53 +00:00
relyea%netscape.com
1c1a88de26
Implement SEC_NicknameConflicts().
2002-02-15 01:57:08 +00:00
wtc%netscape.com
0de7977c09
Bugzilla bug 122712: renamed cert_DecodeGeneralName to
...
CERT_DecodeGeneralName because we export this function from nss.def.
(The cert_ prefix suggests an internal function.)
Modified Files:
lib/certdb/genname.c lib/certdb/genname.h lib/certdb/xconst.c
lib/nss/nss.def
2002-02-14 02:53:20 +00:00
wtc%netscape.com
3730bf5442
Bugzilla bug 123938: renamed cert_EncodeGeneralName to
...
CERT_EncodeGeneralName. Export CERT_EncodeGeneralName and
CERT_FindKeyUsageExtension from nss.def. Have cmmfrec.c include
nssrenam.h to get __CERT_NewTempCertificate.
Modified Files:
lib/certdb/genname.c lib/certdb/genname.h lib/certdb/xconst.c
lib/crmf/cmmfchal.c lib/crmf/cmmfrec.c lib/nss/nss.def
2002-02-14 02:25:21 +00:00
ian.mcgreer%sun.com
d07d80baae
bug 124082, don't change trust of existing CA certs during PKCS#12 import
2002-02-12 00:38:16 +00:00
ian.mcgreer%sun.com
4be862bb78
NSSCryptoContext_ImportCertificate cannot inform the caller that the cert already exists as a temp cert, is is necessary to work around this in CERT_NewTempCertificate by doing a lookup on the cert after it was imported.
...
r=relyea
2002-02-11 22:12:01 +00:00
ian.mcgreer%sun.com
6a275b1a17
This is a revision of the patch shown in bug 122907. It should fix the leakage seen with client auth. It is needed either way, as NSS 3.3 always checked for pre-existing temp certs before creating a new one.
2002-02-07 14:58:05 +00:00
wtc%netscape.com
292ec76f67
Bugzilla bug 119376: initialize a local variable to eliminate a compiler
...
warning.
2002-02-07 01:57:48 +00:00
relyea%netscape.com
4127ac3d22
Identify certs that have no trust as CA's if they have the right settings
2002-02-07 00:50:47 +00:00
ian.mcgreer%sun.com
21e8624189
plug leak found doing client auth, move freeing of cert's slot down a level in case the cert was not made external
2002-02-04 23:04:11 +00:00
ian.mcgreer%sun.com
6caebdc0ff
fix leak reported in bug 123081 by avoiding allocation for time variable
2002-02-04 22:34:22 +00:00
ian.mcgreer%sun.com
73ada3b8ed
couple of fixes
2002-01-31 17:28:49 +00:00
relyea%netscape.com
79e23ff590
restore checks for critical extenstions and fail if we have any we don't
...
recognize. Just remove the bogus check that v2 crls must have critical extensions
2002-01-31 00:42:43 +00:00
relyea%netscape.com
e5d11d5431
Fix 2 memory leaks and a UMR.
...
(keyhand needs to be initialized before we start xor hashing)
Free item and time elements which are transparently allocated for us.
2002-01-26 00:16:03 +00:00
ian.mcgreer%sun.com
ab89e69ce2
implement istemp and isperm in case clients depend on it, make sure certs own a reference to their slot and then free it
2002-01-24 00:58:02 +00:00
ian.mcgreer%sun.com
3a1d638a39
restore function CERT_SaveImportedCert, used to set the trust bits of a cert on import. Fixes bug 121487
2002-01-23 21:43:30 +00:00
ian.mcgreer%sun.com
5b01d3a7d1
fix for bug 120824; functions which collect certs based on subject need to examine *both* the temp and perm stores
2002-01-22 21:56:19 +00:00
ian.mcgreer%sun.com
e45f8c2b70
more backwards compatibility fixes
...
* always send DER of serial number to PKCS#11 queries
* in softoken, construct key for certificate using decoded serial number with (possibly) a leading zero, for compatibility with version 7 db
* in softoken, decode serial number *without* removing leading zero for searches
2002-01-17 00:20:53 +00:00
ian.mcgreer%sun.com
f4bdbb65a9
PKCS#11 needs to receive the serial number DER-encoded
2002-01-14 23:19:17 +00:00
relyea%netscape.com
63ca3827f8
Keep a copy of the DER Crl.
2002-01-11 17:31:09 +00:00
relyea%netscape.com
768f88afc8
Enable OCSP code.
2002-01-10 00:43:39 +00:00
ian.mcgreer%sun.com
28cb1ce89d
move free of CERTCertificate's arena below the NSSCertificate. needed for the case when an NSSCertificate is freed without ever releasing a CERTCertificate.
2002-01-08 18:51:18 +00:00
ian.mcgreer%sun.com
7c74d99884
PSM fixes
...
* implement CERT_AddTempCertToPerm in 3.4
* update object instance lists when needed
* correctly check and allocate trust when changing it
2002-01-07 16:45:26 +00:00
ian.mcgreer%sun.com
16a699c9fb
obey the isperm flag as in nss 3.3
2002-01-06 21:49:48 +00:00
ian.mcgreer%sun.com
19993e549d
only free slot if funrction returns correctly
2002-01-03 22:49:02 +00:00
ian.mcgreer%sun.com
681dce3718
fix aix bustage
2002-01-03 20:19:55 +00:00
ian.mcgreer%sun.com
3cff4ec39c
move handling of certificate reference counting into Stan. NSS 3.4 needs to maintain persistent references of both temp and perm certs in order to replicate the old temp database.
2002-01-03 20:09:30 +00:00
ian.mcgreer%sun.com
20804d889d
temp certs live in a trust domain. allows the idiom of "if not temp, try perm" to work in 3.4.
2001-12-21 19:14:04 +00:00
ian.mcgreer%sun.com
1db2d4b283
remove unneeded hack, put in a couple of error checks
2001-12-20 16:50:22 +00:00
ian.mcgreer%sun.com
8ab68cde61
implement local store of objects for crypto context
2001-12-14 17:32:23 +00:00
relyea%netscape.com
7bfd9c97ec
Clean up compilier warnings on Solaris and Linux, most particularly:
...
1) Implicit declaration of function.
2) Possibly unitialized variables.
These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
2001-12-07 01:36:25 +00:00
ian.mcgreer%sun.com
08de45a2ba
get modification of trust on builtins certs to work by storing the modified trust on the softoken. implement merging of multiple trust instances.
2001-12-06 23:43:14 +00:00
ian.mcgreer%sun.com
c3cb1b39dc
land changes for handling temporary and cached certs in 3.4
...
* separate trust object from cert object
* move handling of cryptoki objects into libdev
* implement digest in libdev (for trust object indexing)
* fixes in cache implementation; connect cache to 3.4 certs
* implement CERT_NewTempCertificate via crypto context
2001-11-28 16:23:51 +00:00
relyea%netscape.com
89d41ad9ef
changes for PSM to compile against NSS shared libraries.
...
Move SSL and S/MIME to the new common MAPFILE usage
2001-11-21 18:00:28 +00:00
relyea%netscape.com
3c7bfd0d6e
More PSM fixes:
...
clean up of the escape adding string code.
Code to keep cert->trust in sync with nscert->trust in various situations.
Code to allow old version of built-ins to continue to work.
Implement TrustDomain_TraverseCertificates so that PK11_ListCerts will work.
2001-11-20 18:28:49 +00:00
relyea%netscape.com
082ac010c2
NSS 3.4 integration changes.
...
1) 3.4 needs to bump the version numbers up by one on secmod.db from NSS 3.3
2) Need to add escapes to the configdirectory. (should add them to other parameters as well.
3) put exported files back into the correct headers.
4) Add _BEGIN/_END protos where appropriate.
2001-11-19 19:04:59 +00:00
ian.mcgreer%sun.com
c59d2d0669
changes to get fips working
2001-11-09 00:36:12 +00:00
ian.mcgreer%sun.com
daefc3b648
get signtool working
2001-11-08 21:23:35 +00:00
ian.mcgreer%sun.com
99acfbbff7
a plethora of changes for handling S/MIME certs
2001-11-08 20:46:11 +00:00
relyea%netscape.com
ecdcdae799
Fixes to make pkcs12 work correctly:
...
1) Make pkcs12 pbe function.
2) add code to allow setting and getting of the key nickname attribute.
2001-11-08 05:39:56 +00:00
relyea%netscape.com
e03f762c52
Land BOB_WORK_BRANCH unto the tip.
...
remove lots of depricated files.
move some files to appropriate directories (pcertdb *_rand
associated headers to soft token, for instance)
rename several stan files which had the same name as other nss files.
remove depricated functions.
2001-11-08 00:15:51 +00:00
ian.mcgreer%sun.com
b0a6d74f17
more trust handling stuff
2001-11-06 20:16:19 +00:00
ian.mcgreer%sun.com
d6045d1fd1
fix possible NULL deref
2001-10-19 20:04:58 +00:00
ian.mcgreer%sun.com
bb45f449ac
prepare certdb for removal of pcertdb.c; reimplement functions using Stan
2001-10-19 18:05:38 +00:00
ian.mcgreer%sun.com
2ce2c64fa2
fix AIX build
2001-10-18 13:58:28 +00:00
ian.mcgreer%sun.com
b9e27bb301
add back pointer to Stan cert from CERTCertificate
2001-10-17 14:37:10 +00:00
relyea%netscape.com
e141975d75
Fix compilier warnings on AIX, HP, Linux, and Solaris.
2001-09-20 21:34:42 +00:00
relyea%netscape.com
aa0d489657
Fix memory leak
2001-08-24 21:15:52 +00:00
wtc%netscape.com
4707b67043
Bugzilla bug 94685: fixed compiler warnings. The patch is from
...
timeless@mac.com .
Modified Files:
cmd/certcgi/certcgi.c cmd/pk12util/pk12util.c
lib/certdb/certdb.c
2001-08-22 22:40:42 +00:00
relyea%netscape.com
59865c3857
Bug 90413
2001-07-11 23:57:01 +00:00
nelsonb%netscape.com
163fb1bcdb
Fix bug 72753. Interpret the "slop time" as seconds, not microseconds.
...
Also, use type PRTime instead of int64 in relevant places.
2001-06-21 03:20:09 +00:00
ddrinan%netscape.com
d1f8485a15
Bug# 74343. Check in for relyea. r=ddrinan,r=mcgreer,sr=blizzard,a=dbaron
2001-06-20 23:14:35 +00:00
nicolson%netscape.com
706dcde7af
Changes for NSS/JSS integration.
2001-06-12 20:57:20 +00:00
relyea%netscape.com
0a4af35267
Add DER version of isCA for JSS.
2001-06-06 23:40:51 +00:00
wtc%netscape.com
482e9d7d2c
Bugzilla bug #77199 : more PR_CALLBACK changes received from Javier
...
Pedemonte <pedemont@us.ibm.com> for OS/2.
Modified files: cert.h, certdb.h
2001-05-22 22:01:33 +00:00